Author Archives: Rafeeq Rehman

About Rafeeq Rehman

Consultant, Author, Researcher.

On Open Source and Poverty Alleviation

While many people and organizations have been praised for their philanthropic work and poverty alleviation, the open source movement does not get the credit it deserves. I would argue that no other work comes even close to what the open … Continue reading

View post to subscribe to site newsletter.

Posted in Open Source | Tagged , , | Comments Off on On Open Source and Poverty Alleviation

What could derail SASE train

There are many reasons that make Secure Access Service Edge (SASE) an appealing concept. Major among these are moving from corporate data centers to the Cloud, need to work from anywhere, reducing complexity, and use of applications delivered as SaaS. … Continue reading

View post to subscribe to site newsletter.

Posted in Digital Transformation, InfoSec | Comments Off on What could derail SASE train

CISO MindMap 2021: What do InfoSec professionals really do?

NOTE: A new version of CISO MindMap (2022) is available at this URL. Most people outside the Cybersecurity profession don’t fully realize and appreciate the complexity of security professionals’ job. I have been publishing and updating this MindMap for almost … Continue reading

Posted in cisomindmap | Comments Off on CISO MindMap 2021: What do InfoSec professionals really do?

SASE: Technology, Transport and Service

What is it? Secure Access Service Edge or SASE is a relatively new concept. The goal is to connect users from anywhere to applications, data and services hosted in any place (Cloud, corporate data centers or Software-as-a-Service platforms). The basic … Continue reading

View post to subscribe to site newsletter.

Posted in Leadership | Comments Off on SASE: Technology, Transport and Service

What is Service Mesh and Why Should Anybody Care?

There is a lot going on with Cloud computing, containers and micro services. Following is a summary of what information security professionals need to know about one very important idea: the Service Mesh. What is it? Service Mesh controls, monitors, … Continue reading

View post to subscribe to site newsletter.

Posted in InfoSec | Tagged , , | Comments Off on What is Service Mesh and Why Should Anybody Care?

PDF Version of Book: Cybersecurity Arm Wrestling available for download

The PDF version of my latest book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is now available for download. You can share this link, print it, and use it … Continue reading

View post to subscribe to site newsletter.

Posted in Education, InfoSec, SOC | Tagged , , | Comments Off on PDF Version of Book: Cybersecurity Arm Wrestling available for download

Perspectives on Information Security Architecture

There are few things that every architect should do but most forget. As you know, there is no shortage of technology architecture frameworks and standards. You may have come across TOGAF for enterprise architecture and SABSA (Sherwood Applied Business Security … Continue reading

Posted in InfoSec | Tagged , | Comments Off on Perspectives on Information Security Architecture

Book “Cybersecurity Arm Wrestling” Published.

My latest book “Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is published and available on amazon.com worldwide. This is a relatively short book with 11 chapters, three sections and about … Continue reading

View post to subscribe to site newsletter.

Posted in Leadership | Tagged , , , | Comments Off on Book “Cybersecurity Arm Wrestling” Published.

Final Draft of Book – Cybersecurity Arm Wrestling

The final draft of “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” book is complete and is available for download and your comments. The book consists of ten chapters as … Continue reading

View post to subscribe to site newsletter.

Posted in Leadership | Comments Off on Final Draft of Book – Cybersecurity Arm Wrestling

Six Essential Ingredients for Building a Successful Security Operations Center (SOC)

Over years of my professional work and research, I found six ingredients absolutely necessary for success of any SOC, big or small. When you combine these ingredients with continuous improvement activities, you will get excellent business results. On the other … Continue reading

View post to subscribe to site newsletter.

Posted in InfoSec, SOC | Tagged , , , | Comments Off on Six Essential Ingredients for Building a Successful Security Operations Center (SOC)